1817466cbSJens Wiklander /*
2817466cbSJens Wiklander * Elliptic curve DSA
3817466cbSJens Wiklander *
47901324dSJerome Forissier * Copyright The Mbed TLS Contributors
5*b0563631STom Van Eyck * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
6817466cbSJens Wiklander */
7817466cbSJens Wiklander
8817466cbSJens Wiklander /*
9817466cbSJens Wiklander * References:
10817466cbSJens Wiklander *
11*b0563631STom Van Eyck * SEC1 https://www.secg.org/sec1-v2.pdf
12817466cbSJens Wiklander */
13817466cbSJens Wiklander
147901324dSJerome Forissier #include "common.h"
15817466cbSJens Wiklander
16817466cbSJens Wiklander #if defined(MBEDTLS_ECDSA_C)
17817466cbSJens Wiklander
18817466cbSJens Wiklander #include "mbedtls/ecdsa.h"
19817466cbSJens Wiklander #include "mbedtls/asn1write.h"
20817466cbSJens Wiklander
21817466cbSJens Wiklander #include <string.h>
22817466cbSJens Wiklander
23817466cbSJens Wiklander #if defined(MBEDTLS_ECDSA_DETERMINISTIC)
24817466cbSJens Wiklander #include "mbedtls/hmac_drbg.h"
25817466cbSJens Wiklander #endif
26817466cbSJens Wiklander
273d3b0591SJens Wiklander #include "mbedtls/platform.h"
283d3b0591SJens Wiklander
293d3b0591SJens Wiklander #include "mbedtls/platform_util.h"
3011fa71b9SJerome Forissier #include "mbedtls/error.h"
313d3b0591SJens Wiklander
323d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE)
333d3b0591SJens Wiklander
343d3b0591SJens Wiklander /*
353d3b0591SJens Wiklander * Sub-context for ecdsa_verify()
363d3b0591SJens Wiklander */
3732b31808SJens Wiklander struct mbedtls_ecdsa_restart_ver {
383d3b0591SJens Wiklander mbedtls_mpi u1, u2; /* intermediate values */
393d3b0591SJens Wiklander enum { /* what to do next? */
403d3b0591SJens Wiklander ecdsa_ver_init = 0, /* getting started */
413d3b0591SJens Wiklander ecdsa_ver_muladd, /* muladd step */
423d3b0591SJens Wiklander } state;
433d3b0591SJens Wiklander };
443d3b0591SJens Wiklander
453d3b0591SJens Wiklander /*
463d3b0591SJens Wiklander * Init verify restart sub-context
473d3b0591SJens Wiklander */
ecdsa_restart_ver_init(mbedtls_ecdsa_restart_ver_ctx * ctx)483d3b0591SJens Wiklander static void ecdsa_restart_ver_init(mbedtls_ecdsa_restart_ver_ctx *ctx)
493d3b0591SJens Wiklander {
503d3b0591SJens Wiklander mbedtls_mpi_init(&ctx->u1);
513d3b0591SJens Wiklander mbedtls_mpi_init(&ctx->u2);
523d3b0591SJens Wiklander ctx->state = ecdsa_ver_init;
533d3b0591SJens Wiklander }
543d3b0591SJens Wiklander
553d3b0591SJens Wiklander /*
563d3b0591SJens Wiklander * Free the components of a verify restart sub-context
573d3b0591SJens Wiklander */
ecdsa_restart_ver_free(mbedtls_ecdsa_restart_ver_ctx * ctx)583d3b0591SJens Wiklander static void ecdsa_restart_ver_free(mbedtls_ecdsa_restart_ver_ctx *ctx)
593d3b0591SJens Wiklander {
6032b31808SJens Wiklander if (ctx == NULL) {
613d3b0591SJens Wiklander return;
6232b31808SJens Wiklander }
633d3b0591SJens Wiklander
643d3b0591SJens Wiklander mbedtls_mpi_free(&ctx->u1);
653d3b0591SJens Wiklander mbedtls_mpi_free(&ctx->u2);
663d3b0591SJens Wiklander
673d3b0591SJens Wiklander ecdsa_restart_ver_init(ctx);
683d3b0591SJens Wiklander }
693d3b0591SJens Wiklander
703d3b0591SJens Wiklander /*
713d3b0591SJens Wiklander * Sub-context for ecdsa_sign()
723d3b0591SJens Wiklander */
7332b31808SJens Wiklander struct mbedtls_ecdsa_restart_sig {
743d3b0591SJens Wiklander int sign_tries;
753d3b0591SJens Wiklander int key_tries;
763d3b0591SJens Wiklander mbedtls_mpi k; /* per-signature random */
773d3b0591SJens Wiklander mbedtls_mpi r; /* r value */
783d3b0591SJens Wiklander enum { /* what to do next? */
793d3b0591SJens Wiklander ecdsa_sig_init = 0, /* getting started */
803d3b0591SJens Wiklander ecdsa_sig_mul, /* doing ecp_mul() */
813d3b0591SJens Wiklander ecdsa_sig_modn, /* mod N computations */
823d3b0591SJens Wiklander } state;
833d3b0591SJens Wiklander };
843d3b0591SJens Wiklander
853d3b0591SJens Wiklander /*
863d3b0591SJens Wiklander * Init verify sign sub-context
873d3b0591SJens Wiklander */
ecdsa_restart_sig_init(mbedtls_ecdsa_restart_sig_ctx * ctx)883d3b0591SJens Wiklander static void ecdsa_restart_sig_init(mbedtls_ecdsa_restart_sig_ctx *ctx)
893d3b0591SJens Wiklander {
903d3b0591SJens Wiklander ctx->sign_tries = 0;
913d3b0591SJens Wiklander ctx->key_tries = 0;
923d3b0591SJens Wiklander mbedtls_mpi_init(&ctx->k);
933d3b0591SJens Wiklander mbedtls_mpi_init(&ctx->r);
943d3b0591SJens Wiklander ctx->state = ecdsa_sig_init;
953d3b0591SJens Wiklander }
963d3b0591SJens Wiklander
973d3b0591SJens Wiklander /*
983d3b0591SJens Wiklander * Free the components of a sign restart sub-context
993d3b0591SJens Wiklander */
ecdsa_restart_sig_free(mbedtls_ecdsa_restart_sig_ctx * ctx)1003d3b0591SJens Wiklander static void ecdsa_restart_sig_free(mbedtls_ecdsa_restart_sig_ctx *ctx)
1013d3b0591SJens Wiklander {
10232b31808SJens Wiklander if (ctx == NULL) {
1033d3b0591SJens Wiklander return;
10432b31808SJens Wiklander }
1053d3b0591SJens Wiklander
1063d3b0591SJens Wiklander mbedtls_mpi_free(&ctx->k);
1073d3b0591SJens Wiklander mbedtls_mpi_free(&ctx->r);
1083d3b0591SJens Wiklander }
1093d3b0591SJens Wiklander
1103d3b0591SJens Wiklander #if defined(MBEDTLS_ECDSA_DETERMINISTIC)
1113d3b0591SJens Wiklander /*
1123d3b0591SJens Wiklander * Sub-context for ecdsa_sign_det()
1133d3b0591SJens Wiklander */
11432b31808SJens Wiklander struct mbedtls_ecdsa_restart_det {
1153d3b0591SJens Wiklander mbedtls_hmac_drbg_context rng_ctx; /* DRBG state */
1163d3b0591SJens Wiklander enum { /* what to do next? */
1173d3b0591SJens Wiklander ecdsa_det_init = 0, /* getting started */
1183d3b0591SJens Wiklander ecdsa_det_sign, /* make signature */
1193d3b0591SJens Wiklander } state;
1203d3b0591SJens Wiklander };
1213d3b0591SJens Wiklander
1223d3b0591SJens Wiklander /*
1233d3b0591SJens Wiklander * Init verify sign_det sub-context
1243d3b0591SJens Wiklander */
ecdsa_restart_det_init(mbedtls_ecdsa_restart_det_ctx * ctx)1253d3b0591SJens Wiklander static void ecdsa_restart_det_init(mbedtls_ecdsa_restart_det_ctx *ctx)
1263d3b0591SJens Wiklander {
1273d3b0591SJens Wiklander mbedtls_hmac_drbg_init(&ctx->rng_ctx);
1283d3b0591SJens Wiklander ctx->state = ecdsa_det_init;
1293d3b0591SJens Wiklander }
1303d3b0591SJens Wiklander
1313d3b0591SJens Wiklander /*
1323d3b0591SJens Wiklander * Free the components of a sign_det restart sub-context
1333d3b0591SJens Wiklander */
ecdsa_restart_det_free(mbedtls_ecdsa_restart_det_ctx * ctx)1343d3b0591SJens Wiklander static void ecdsa_restart_det_free(mbedtls_ecdsa_restart_det_ctx *ctx)
1353d3b0591SJens Wiklander {
13632b31808SJens Wiklander if (ctx == NULL) {
1373d3b0591SJens Wiklander return;
13832b31808SJens Wiklander }
1393d3b0591SJens Wiklander
1403d3b0591SJens Wiklander mbedtls_hmac_drbg_free(&ctx->rng_ctx);
1413d3b0591SJens Wiklander
1423d3b0591SJens Wiklander ecdsa_restart_det_init(ctx);
1433d3b0591SJens Wiklander }
1443d3b0591SJens Wiklander #endif /* MBEDTLS_ECDSA_DETERMINISTIC */
1453d3b0591SJens Wiklander
1465b25c76aSJerome Forissier #define ECDSA_RS_ECP (rs_ctx == NULL ? NULL : &rs_ctx->ecp)
1473d3b0591SJens Wiklander
1483d3b0591SJens Wiklander /* Utility macro for checking and updating ops budget */
1493d3b0591SJens Wiklander #define ECDSA_BUDGET(ops) \
1505b25c76aSJerome Forissier MBEDTLS_MPI_CHK(mbedtls_ecp_check_budget(grp, ECDSA_RS_ECP, ops));
1513d3b0591SJens Wiklander
1523d3b0591SJens Wiklander /* Call this when entering a function that needs its own sub-context */
1533d3b0591SJens Wiklander #define ECDSA_RS_ENTER(SUB) do { \
1543d3b0591SJens Wiklander /* reset ops count for this call if top-level */ \
1553d3b0591SJens Wiklander if (rs_ctx != NULL && rs_ctx->ecp.depth++ == 0) \
1563d3b0591SJens Wiklander rs_ctx->ecp.ops_done = 0; \
1573d3b0591SJens Wiklander \
1583d3b0591SJens Wiklander /* set up our own sub-context if needed */ \
1593d3b0591SJens Wiklander if (mbedtls_ecp_restart_is_enabled() && \
1603d3b0591SJens Wiklander rs_ctx != NULL && rs_ctx->SUB == NULL) \
1613d3b0591SJens Wiklander { \
1623d3b0591SJens Wiklander rs_ctx->SUB = mbedtls_calloc(1, sizeof(*rs_ctx->SUB)); \
1633d3b0591SJens Wiklander if (rs_ctx->SUB == NULL) \
16432b31808SJens Wiklander return MBEDTLS_ERR_ECP_ALLOC_FAILED; \
1653d3b0591SJens Wiklander \
1663d3b0591SJens Wiklander ecdsa_restart_## SUB ##_init(rs_ctx->SUB); \
1673d3b0591SJens Wiklander } \
1683d3b0591SJens Wiklander } while (0)
1693d3b0591SJens Wiklander
1703d3b0591SJens Wiklander /* Call this when leaving a function that needs its own sub-context */
1713d3b0591SJens Wiklander #define ECDSA_RS_LEAVE(SUB) do { \
1723d3b0591SJens Wiklander /* clear our sub-context when not in progress (done or error) */ \
1733d3b0591SJens Wiklander if (rs_ctx != NULL && rs_ctx->SUB != NULL && \
1743d3b0591SJens Wiklander ret != MBEDTLS_ERR_ECP_IN_PROGRESS) \
1753d3b0591SJens Wiklander { \
1763d3b0591SJens Wiklander ecdsa_restart_## SUB ##_free(rs_ctx->SUB); \
1773d3b0591SJens Wiklander mbedtls_free(rs_ctx->SUB); \
1783d3b0591SJens Wiklander rs_ctx->SUB = NULL; \
1793d3b0591SJens Wiklander } \
1803d3b0591SJens Wiklander \
1813d3b0591SJens Wiklander if (rs_ctx != NULL) \
1823d3b0591SJens Wiklander rs_ctx->ecp.depth--; \
1833d3b0591SJens Wiklander } while (0)
1843d3b0591SJens Wiklander
1853d3b0591SJens Wiklander #else /* MBEDTLS_ECP_RESTARTABLE */
1863d3b0591SJens Wiklander
1873d3b0591SJens Wiklander #define ECDSA_RS_ECP NULL
1883d3b0591SJens Wiklander
1893d3b0591SJens Wiklander #define ECDSA_BUDGET(ops) /* no-op; for compatibility */
1903d3b0591SJens Wiklander
1913d3b0591SJens Wiklander #define ECDSA_RS_ENTER(SUB) (void) rs_ctx
1923d3b0591SJens Wiklander #define ECDSA_RS_LEAVE(SUB) (void) rs_ctx
1933d3b0591SJens Wiklander
1943d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_RESTARTABLE */
1953d3b0591SJens Wiklander
1967901324dSJerome Forissier #if defined(MBEDTLS_ECDSA_DETERMINISTIC) || \
1977901324dSJerome Forissier !defined(MBEDTLS_ECDSA_SIGN_ALT) || \
1987901324dSJerome Forissier !defined(MBEDTLS_ECDSA_VERIFY_ALT)
199817466cbSJens Wiklander /*
200817466cbSJens Wiklander * Derive a suitable integer for group grp from a buffer of length len
201817466cbSJens Wiklander * SEC1 4.1.3 step 5 aka SEC1 4.1.4 step 3
202817466cbSJens Wiklander */
derive_mpi(const mbedtls_ecp_group * grp,mbedtls_mpi * x,const unsigned char * buf,size_t blen)203817466cbSJens Wiklander static int derive_mpi(const mbedtls_ecp_group *grp, mbedtls_mpi *x,
204817466cbSJens Wiklander const unsigned char *buf, size_t blen)
205817466cbSJens Wiklander {
20611fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
207817466cbSJens Wiklander size_t n_size = (grp->nbits + 7) / 8;
208817466cbSJens Wiklander size_t use_size = blen > n_size ? n_size : blen;
209817466cbSJens Wiklander
210817466cbSJens Wiklander MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(x, buf, use_size));
21132b31808SJens Wiklander if (use_size * 8 > grp->nbits) {
212817466cbSJens Wiklander MBEDTLS_MPI_CHK(mbedtls_mpi_shift_r(x, use_size * 8 - grp->nbits));
21332b31808SJens Wiklander }
214817466cbSJens Wiklander
215817466cbSJens Wiklander /* While at it, reduce modulo N */
21632b31808SJens Wiklander if (mbedtls_mpi_cmp_mpi(x, &grp->N) >= 0) {
217817466cbSJens Wiklander MBEDTLS_MPI_CHK(mbedtls_mpi_sub_mpi(x, x, &grp->N));
21832b31808SJens Wiklander }
219817466cbSJens Wiklander
220817466cbSJens Wiklander cleanup:
22132b31808SJens Wiklander return ret;
222817466cbSJens Wiklander }
2237901324dSJerome Forissier #endif /* ECDSA_DETERMINISTIC || !ECDSA_SIGN_ALT || !ECDSA_VERIFY_ALT */
224817466cbSJens Wiklander
mbedtls_ecdsa_can_do(mbedtls_ecp_group_id gid)225*b0563631STom Van Eyck int mbedtls_ecdsa_can_do(mbedtls_ecp_group_id gid)
226*b0563631STom Van Eyck {
227*b0563631STom Van Eyck switch (gid) {
228*b0563631STom Van Eyck #ifdef MBEDTLS_ECP_DP_CURVE25519_ENABLED
229*b0563631STom Van Eyck case MBEDTLS_ECP_DP_CURVE25519: return 0;
230*b0563631STom Van Eyck #endif
231*b0563631STom Van Eyck #ifdef MBEDTLS_ECP_DP_CURVE448_ENABLED
232*b0563631STom Van Eyck case MBEDTLS_ECP_DP_CURVE448: return 0;
233*b0563631STom Van Eyck #endif
234*b0563631STom Van Eyck default: return 1;
235*b0563631STom Van Eyck }
236*b0563631STom Van Eyck }
237*b0563631STom Van Eyck
2383d3b0591SJens Wiklander #if !defined(MBEDTLS_ECDSA_SIGN_ALT)
239817466cbSJens Wiklander /*
240817466cbSJens Wiklander * Compute ECDSA signature of a hashed message (SEC1 4.1.3)
241817466cbSJens Wiklander * Obviously, compared to SEC1 4.1.3, we skip step 4 (hash message)
242817466cbSJens Wiklander */
mbedtls_ecdsa_sign_restartable(mbedtls_ecp_group * grp,mbedtls_mpi * r,mbedtls_mpi * s,const mbedtls_mpi * d,const unsigned char * buf,size_t blen,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng,int (* f_rng_blind)(void *,unsigned char *,size_t),void * p_rng_blind,mbedtls_ecdsa_restart_ctx * rs_ctx)24332b31808SJens Wiklander int mbedtls_ecdsa_sign_restartable(mbedtls_ecp_group *grp,
2443d3b0591SJens Wiklander mbedtls_mpi *r, mbedtls_mpi *s,
245817466cbSJens Wiklander const mbedtls_mpi *d, const unsigned char *buf, size_t blen,
2463d3b0591SJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng,
2475b25c76aSJerome Forissier int (*f_rng_blind)(void *, unsigned char *, size_t),
2485b25c76aSJerome Forissier void *p_rng_blind,
2493d3b0591SJens Wiklander mbedtls_ecdsa_restart_ctx *rs_ctx)
250817466cbSJens Wiklander {
2513d3b0591SJens Wiklander int ret, key_tries, sign_tries;
2523d3b0591SJens Wiklander int *p_sign_tries = &sign_tries, *p_key_tries = &key_tries;
253817466cbSJens Wiklander mbedtls_ecp_point R;
254817466cbSJens Wiklander mbedtls_mpi k, e, t;
2553d3b0591SJens Wiklander mbedtls_mpi *pk = &k, *pr = r;
256817466cbSJens Wiklander
257817466cbSJens Wiklander /* Fail cleanly on curves such as Curve25519 that can't be used for ECDSA */
25832b31808SJens Wiklander if (!mbedtls_ecdsa_can_do(grp->id) || grp->N.p == NULL) {
25932b31808SJens Wiklander return MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
26032b31808SJens Wiklander }
261817466cbSJens Wiklander
2623d3b0591SJens Wiklander /* Make sure d is in range 1..n-1 */
26332b31808SJens Wiklander if (mbedtls_mpi_cmp_int(d, 1) < 0 || mbedtls_mpi_cmp_mpi(d, &grp->N) >= 0) {
26432b31808SJens Wiklander return MBEDTLS_ERR_ECP_INVALID_KEY;
26532b31808SJens Wiklander }
2663d3b0591SJens Wiklander
267817466cbSJens Wiklander mbedtls_ecp_point_init(&R);
268817466cbSJens Wiklander mbedtls_mpi_init(&k); mbedtls_mpi_init(&e); mbedtls_mpi_init(&t);
269817466cbSJens Wiklander
2703d3b0591SJens Wiklander ECDSA_RS_ENTER(sig);
271817466cbSJens Wiklander
2723d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE)
27332b31808SJens Wiklander if (rs_ctx != NULL && rs_ctx->sig != NULL) {
2743d3b0591SJens Wiklander /* redirect to our context */
2753d3b0591SJens Wiklander p_sign_tries = &rs_ctx->sig->sign_tries;
2763d3b0591SJens Wiklander p_key_tries = &rs_ctx->sig->key_tries;
2773d3b0591SJens Wiklander pk = &rs_ctx->sig->k;
2783d3b0591SJens Wiklander pr = &rs_ctx->sig->r;
2793d3b0591SJens Wiklander
2803d3b0591SJens Wiklander /* jump to current step */
28132b31808SJens Wiklander if (rs_ctx->sig->state == ecdsa_sig_mul) {
2823d3b0591SJens Wiklander goto mul;
28332b31808SJens Wiklander }
28432b31808SJens Wiklander if (rs_ctx->sig->state == ecdsa_sig_modn) {
2853d3b0591SJens Wiklander goto modn;
2863d3b0591SJens Wiklander }
28732b31808SJens Wiklander }
2883d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_RESTARTABLE */
2893d3b0591SJens Wiklander
2903d3b0591SJens Wiklander *p_sign_tries = 0;
29132b31808SJens Wiklander do {
29232b31808SJens Wiklander if ((*p_sign_tries)++ > 10) {
293817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_RANDOM_FAILED;
294817466cbSJens Wiklander goto cleanup;
295817466cbSJens Wiklander }
2963d3b0591SJens Wiklander
2973d3b0591SJens Wiklander /*
2983d3b0591SJens Wiklander * Steps 1-3: generate a suitable ephemeral keypair
2993d3b0591SJens Wiklander * and set r = xR mod n
3003d3b0591SJens Wiklander */
3013d3b0591SJens Wiklander *p_key_tries = 0;
30232b31808SJens Wiklander do {
30332b31808SJens Wiklander if ((*p_key_tries)++ > 10) {
3043d3b0591SJens Wiklander ret = MBEDTLS_ERR_ECP_RANDOM_FAILED;
3053d3b0591SJens Wiklander goto cleanup;
306817466cbSJens Wiklander }
3073d3b0591SJens Wiklander
3083d3b0591SJens Wiklander MBEDTLS_MPI_CHK(mbedtls_ecp_gen_privkey(grp, pk, f_rng, p_rng));
3093d3b0591SJens Wiklander
3103d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE)
31132b31808SJens Wiklander if (rs_ctx != NULL && rs_ctx->sig != NULL) {
3123d3b0591SJens Wiklander rs_ctx->sig->state = ecdsa_sig_mul;
31332b31808SJens Wiklander }
3143d3b0591SJens Wiklander
3153d3b0591SJens Wiklander mul:
3163d3b0591SJens Wiklander #endif
3173d3b0591SJens Wiklander MBEDTLS_MPI_CHK(mbedtls_ecp_mul_restartable(grp, &R, pk, &grp->G,
3185b25c76aSJerome Forissier f_rng_blind,
3195b25c76aSJerome Forissier p_rng_blind,
3205b25c76aSJerome Forissier ECDSA_RS_ECP));
3213d3b0591SJens Wiklander MBEDTLS_MPI_CHK(mbedtls_mpi_mod_mpi(pr, &R.X, &grp->N));
32232b31808SJens Wiklander } while (mbedtls_mpi_cmp_int(pr, 0) == 0);
3233d3b0591SJens Wiklander
3243d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE)
32532b31808SJens Wiklander if (rs_ctx != NULL && rs_ctx->sig != NULL) {
3263d3b0591SJens Wiklander rs_ctx->sig->state = ecdsa_sig_modn;
32732b31808SJens Wiklander }
3283d3b0591SJens Wiklander
3293d3b0591SJens Wiklander modn:
3303d3b0591SJens Wiklander #endif
3313d3b0591SJens Wiklander /*
3323d3b0591SJens Wiklander * Accounting for everything up to the end of the loop
3333d3b0591SJens Wiklander * (step 6, but checking now avoids saving e and t)
3343d3b0591SJens Wiklander */
3353d3b0591SJens Wiklander ECDSA_BUDGET(MBEDTLS_ECP_OPS_INV + 4);
336817466cbSJens Wiklander
337817466cbSJens Wiklander /*
338817466cbSJens Wiklander * Step 5: derive MPI from hashed message
339817466cbSJens Wiklander */
340817466cbSJens Wiklander MBEDTLS_MPI_CHK(derive_mpi(grp, &e, buf, blen));
341817466cbSJens Wiklander
342817466cbSJens Wiklander /*
343817466cbSJens Wiklander * Generate a random value to blind inv_mod in next step,
344817466cbSJens Wiklander * avoiding a potential timing leak.
345817466cbSJens Wiklander */
3465b25c76aSJerome Forissier MBEDTLS_MPI_CHK(mbedtls_ecp_gen_privkey(grp, &t, f_rng_blind,
3475b25c76aSJerome Forissier p_rng_blind));
348817466cbSJens Wiklander
349817466cbSJens Wiklander /*
350817466cbSJens Wiklander * Step 6: compute s = (e + r * d) / k = t (e + rd) / (kt) mod n
351817466cbSJens Wiklander */
3523d3b0591SJens Wiklander MBEDTLS_MPI_CHK(mbedtls_mpi_mul_mpi(s, pr, d));
353817466cbSJens Wiklander MBEDTLS_MPI_CHK(mbedtls_mpi_add_mpi(&e, &e, s));
354817466cbSJens Wiklander MBEDTLS_MPI_CHK(mbedtls_mpi_mul_mpi(&e, &e, &t));
3553d3b0591SJens Wiklander MBEDTLS_MPI_CHK(mbedtls_mpi_mul_mpi(pk, pk, &t));
3565b25c76aSJerome Forissier MBEDTLS_MPI_CHK(mbedtls_mpi_mod_mpi(pk, pk, &grp->N));
3573d3b0591SJens Wiklander MBEDTLS_MPI_CHK(mbedtls_mpi_inv_mod(s, pk, &grp->N));
358817466cbSJens Wiklander MBEDTLS_MPI_CHK(mbedtls_mpi_mul_mpi(s, s, &e));
359817466cbSJens Wiklander MBEDTLS_MPI_CHK(mbedtls_mpi_mod_mpi(s, s, &grp->N));
36032b31808SJens Wiklander } while (mbedtls_mpi_cmp_int(s, 0) == 0);
361817466cbSJens Wiklander
3623d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE)
36332b31808SJens Wiklander if (rs_ctx != NULL && rs_ctx->sig != NULL) {
364*b0563631STom Van Eyck MBEDTLS_MPI_CHK(mbedtls_mpi_copy(r, pr));
36532b31808SJens Wiklander }
3663d3b0591SJens Wiklander #endif
3673d3b0591SJens Wiklander
368817466cbSJens Wiklander cleanup:
369817466cbSJens Wiklander mbedtls_ecp_point_free(&R);
370817466cbSJens Wiklander mbedtls_mpi_free(&k); mbedtls_mpi_free(&e); mbedtls_mpi_free(&t);
371817466cbSJens Wiklander
3723d3b0591SJens Wiklander ECDSA_RS_LEAVE(sig);
3733d3b0591SJens Wiklander
37432b31808SJens Wiklander return ret;
375817466cbSJens Wiklander }
376817466cbSJens Wiklander
3773d3b0591SJens Wiklander /*
3783d3b0591SJens Wiklander * Compute ECDSA signature of a hashed message
3793d3b0591SJens Wiklander */
mbedtls_ecdsa_sign(mbedtls_ecp_group * grp,mbedtls_mpi * r,mbedtls_mpi * s,const mbedtls_mpi * d,const unsigned char * buf,size_t blen,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)3803d3b0591SJens Wiklander int mbedtls_ecdsa_sign(mbedtls_ecp_group *grp, mbedtls_mpi *r, mbedtls_mpi *s,
3813d3b0591SJens Wiklander const mbedtls_mpi *d, const unsigned char *buf, size_t blen,
3823d3b0591SJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
3833d3b0591SJens Wiklander {
3845b25c76aSJerome Forissier /* Use the same RNG for both blinding and ephemeral key generation */
38532b31808SJens Wiklander return mbedtls_ecdsa_sign_restartable(grp, r, s, d, buf, blen,
38632b31808SJens Wiklander f_rng, p_rng, f_rng, p_rng, NULL);
3873d3b0591SJens Wiklander }
3883d3b0591SJens Wiklander #endif /* !MBEDTLS_ECDSA_SIGN_ALT */
3893d3b0591SJens Wiklander
390817466cbSJens Wiklander #if defined(MBEDTLS_ECDSA_DETERMINISTIC)
391817466cbSJens Wiklander /*
392817466cbSJens Wiklander * Deterministic signature wrapper
39332b31808SJens Wiklander *
39432b31808SJens Wiklander * note: The f_rng_blind parameter must not be NULL.
39532b31808SJens Wiklander *
396817466cbSJens Wiklander */
mbedtls_ecdsa_sign_det_restartable(mbedtls_ecp_group * grp,mbedtls_mpi * r,mbedtls_mpi * s,const mbedtls_mpi * d,const unsigned char * buf,size_t blen,mbedtls_md_type_t md_alg,int (* f_rng_blind)(void *,unsigned char *,size_t),void * p_rng_blind,mbedtls_ecdsa_restart_ctx * rs_ctx)39732b31808SJens Wiklander int mbedtls_ecdsa_sign_det_restartable(mbedtls_ecp_group *grp,
3983d3b0591SJens Wiklander mbedtls_mpi *r, mbedtls_mpi *s,
399817466cbSJens Wiklander const mbedtls_mpi *d, const unsigned char *buf, size_t blen,
4003d3b0591SJens Wiklander mbedtls_md_type_t md_alg,
4015b25c76aSJerome Forissier int (*f_rng_blind)(void *, unsigned char *, size_t),
4025b25c76aSJerome Forissier void *p_rng_blind,
4033d3b0591SJens Wiklander mbedtls_ecdsa_restart_ctx *rs_ctx)
404817466cbSJens Wiklander {
40511fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
406817466cbSJens Wiklander mbedtls_hmac_drbg_context rng_ctx;
4073d3b0591SJens Wiklander mbedtls_hmac_drbg_context *p_rng = &rng_ctx;
408817466cbSJens Wiklander unsigned char data[2 * MBEDTLS_ECP_MAX_BYTES];
409817466cbSJens Wiklander size_t grp_len = (grp->nbits + 7) / 8;
410817466cbSJens Wiklander const mbedtls_md_info_t *md_info;
411817466cbSJens Wiklander mbedtls_mpi h;
412817466cbSJens Wiklander
41332b31808SJens Wiklander if ((md_info = mbedtls_md_info_from_type(md_alg)) == NULL) {
41432b31808SJens Wiklander return MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
41532b31808SJens Wiklander }
416817466cbSJens Wiklander
417817466cbSJens Wiklander mbedtls_mpi_init(&h);
418817466cbSJens Wiklander mbedtls_hmac_drbg_init(&rng_ctx);
419817466cbSJens Wiklander
4203d3b0591SJens Wiklander ECDSA_RS_ENTER(det);
4213d3b0591SJens Wiklander
4223d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE)
42332b31808SJens Wiklander if (rs_ctx != NULL && rs_ctx->det != NULL) {
4243d3b0591SJens Wiklander /* redirect to our context */
4253d3b0591SJens Wiklander p_rng = &rs_ctx->det->rng_ctx;
4263d3b0591SJens Wiklander
4273d3b0591SJens Wiklander /* jump to current step */
42832b31808SJens Wiklander if (rs_ctx->det->state == ecdsa_det_sign) {
4293d3b0591SJens Wiklander goto sign;
4303d3b0591SJens Wiklander }
43132b31808SJens Wiklander }
4323d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_RESTARTABLE */
4333d3b0591SJens Wiklander
434817466cbSJens Wiklander /* Use private key and message hash (reduced) to initialize HMAC_DRBG */
435817466cbSJens Wiklander MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(d, data, grp_len));
436817466cbSJens Wiklander MBEDTLS_MPI_CHK(derive_mpi(grp, &h, buf, blen));
437817466cbSJens Wiklander MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&h, data + grp_len, grp_len));
438*b0563631STom Van Eyck MBEDTLS_MPI_CHK(mbedtls_hmac_drbg_seed_buf(p_rng, md_info, data, 2 * grp_len));
439817466cbSJens Wiklander
4403d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE)
44132b31808SJens Wiklander if (rs_ctx != NULL && rs_ctx->det != NULL) {
4423d3b0591SJens Wiklander rs_ctx->det->state = ecdsa_det_sign;
44332b31808SJens Wiklander }
4443d3b0591SJens Wiklander
4453d3b0591SJens Wiklander sign:
4463d3b0591SJens Wiklander #endif
4473d3b0591SJens Wiklander #if defined(MBEDTLS_ECDSA_SIGN_ALT)
4487901324dSJerome Forissier (void) f_rng_blind;
4497901324dSJerome Forissier (void) p_rng_blind;
450817466cbSJens Wiklander ret = mbedtls_ecdsa_sign(grp, r, s, d, buf, blen,
4513d3b0591SJens Wiklander mbedtls_hmac_drbg_random, p_rng);
4523d3b0591SJens Wiklander #else
45332b31808SJens Wiklander ret = mbedtls_ecdsa_sign_restartable(grp, r, s, d, buf, blen,
4545b25c76aSJerome Forissier mbedtls_hmac_drbg_random, p_rng,
4555b25c76aSJerome Forissier f_rng_blind, p_rng_blind, rs_ctx);
4563d3b0591SJens Wiklander #endif /* MBEDTLS_ECDSA_SIGN_ALT */
457817466cbSJens Wiklander
458817466cbSJens Wiklander cleanup:
459817466cbSJens Wiklander mbedtls_hmac_drbg_free(&rng_ctx);
460817466cbSJens Wiklander mbedtls_mpi_free(&h);
461817466cbSJens Wiklander
4623d3b0591SJens Wiklander ECDSA_RS_LEAVE(det);
4633d3b0591SJens Wiklander
46432b31808SJens Wiklander return ret;
465817466cbSJens Wiklander }
4663d3b0591SJens Wiklander
4673d3b0591SJens Wiklander /*
46832b31808SJens Wiklander * Deterministic signature wrapper
4693d3b0591SJens Wiklander */
mbedtls_ecdsa_sign_det_ext(mbedtls_ecp_group * grp,mbedtls_mpi * r,mbedtls_mpi * s,const mbedtls_mpi * d,const unsigned char * buf,size_t blen,mbedtls_md_type_t md_alg,int (* f_rng_blind)(void *,unsigned char *,size_t),void * p_rng_blind)4705b25c76aSJerome Forissier int mbedtls_ecdsa_sign_det_ext(mbedtls_ecp_group *grp, mbedtls_mpi *r,
4715b25c76aSJerome Forissier mbedtls_mpi *s, const mbedtls_mpi *d,
4725b25c76aSJerome Forissier const unsigned char *buf, size_t blen,
4735b25c76aSJerome Forissier mbedtls_md_type_t md_alg,
4745b25c76aSJerome Forissier int (*f_rng_blind)(void *, unsigned char *,
4755b25c76aSJerome Forissier size_t),
4765b25c76aSJerome Forissier void *p_rng_blind)
4775b25c76aSJerome Forissier {
47832b31808SJens Wiklander return mbedtls_ecdsa_sign_det_restartable(grp, r, s, d, buf, blen, md_alg,
47932b31808SJens Wiklander f_rng_blind, p_rng_blind, NULL);
4803d3b0591SJens Wiklander }
481817466cbSJens Wiklander #endif /* MBEDTLS_ECDSA_DETERMINISTIC */
482817466cbSJens Wiklander
4833d3b0591SJens Wiklander #if !defined(MBEDTLS_ECDSA_VERIFY_ALT)
484817466cbSJens Wiklander /*
485817466cbSJens Wiklander * Verify ECDSA signature of hashed message (SEC1 4.1.4)
486817466cbSJens Wiklander * Obviously, compared to SEC1 4.1.3, we skip step 2 (hash message)
487817466cbSJens Wiklander */
mbedtls_ecdsa_verify_restartable(mbedtls_ecp_group * grp,const unsigned char * buf,size_t blen,const mbedtls_ecp_point * Q,const mbedtls_mpi * r,const mbedtls_mpi * s,mbedtls_ecdsa_restart_ctx * rs_ctx)48832b31808SJens Wiklander int mbedtls_ecdsa_verify_restartable(mbedtls_ecp_group *grp,
489817466cbSJens Wiklander const unsigned char *buf, size_t blen,
4903d3b0591SJens Wiklander const mbedtls_ecp_point *Q,
49132b31808SJens Wiklander const mbedtls_mpi *r,
49232b31808SJens Wiklander const mbedtls_mpi *s,
4933d3b0591SJens Wiklander mbedtls_ecdsa_restart_ctx *rs_ctx)
494817466cbSJens Wiklander {
49511fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
496817466cbSJens Wiklander mbedtls_mpi e, s_inv, u1, u2;
497817466cbSJens Wiklander mbedtls_ecp_point R;
4983d3b0591SJens Wiklander mbedtls_mpi *pu1 = &u1, *pu2 = &u2;
499817466cbSJens Wiklander
500817466cbSJens Wiklander mbedtls_ecp_point_init(&R);
5013d3b0591SJens Wiklander mbedtls_mpi_init(&e); mbedtls_mpi_init(&s_inv);
5023d3b0591SJens Wiklander mbedtls_mpi_init(&u1); mbedtls_mpi_init(&u2);
503817466cbSJens Wiklander
504817466cbSJens Wiklander /* Fail cleanly on curves such as Curve25519 that can't be used for ECDSA */
50532b31808SJens Wiklander if (!mbedtls_ecdsa_can_do(grp->id) || grp->N.p == NULL) {
50632b31808SJens Wiklander return MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
50732b31808SJens Wiklander }
508817466cbSJens Wiklander
5093d3b0591SJens Wiklander ECDSA_RS_ENTER(ver);
5103d3b0591SJens Wiklander
5113d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE)
51232b31808SJens Wiklander if (rs_ctx != NULL && rs_ctx->ver != NULL) {
5133d3b0591SJens Wiklander /* redirect to our context */
5143d3b0591SJens Wiklander pu1 = &rs_ctx->ver->u1;
5153d3b0591SJens Wiklander pu2 = &rs_ctx->ver->u2;
5163d3b0591SJens Wiklander
5173d3b0591SJens Wiklander /* jump to current step */
51832b31808SJens Wiklander if (rs_ctx->ver->state == ecdsa_ver_muladd) {
5193d3b0591SJens Wiklander goto muladd;
5203d3b0591SJens Wiklander }
52132b31808SJens Wiklander }
5223d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_RESTARTABLE */
5233d3b0591SJens Wiklander
524817466cbSJens Wiklander /*
525817466cbSJens Wiklander * Step 1: make sure r and s are in range 1..n-1
526817466cbSJens Wiklander */
527817466cbSJens Wiklander if (mbedtls_mpi_cmp_int(r, 1) < 0 || mbedtls_mpi_cmp_mpi(r, &grp->N) >= 0 ||
52832b31808SJens Wiklander mbedtls_mpi_cmp_int(s, 1) < 0 || mbedtls_mpi_cmp_mpi(s, &grp->N) >= 0) {
529817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_VERIFY_FAILED;
530817466cbSJens Wiklander goto cleanup;
531817466cbSJens Wiklander }
532817466cbSJens Wiklander
533817466cbSJens Wiklander /*
534817466cbSJens Wiklander * Step 3: derive MPI from hashed message
535817466cbSJens Wiklander */
536817466cbSJens Wiklander MBEDTLS_MPI_CHK(derive_mpi(grp, &e, buf, blen));
537817466cbSJens Wiklander
538817466cbSJens Wiklander /*
539817466cbSJens Wiklander * Step 4: u1 = e / s mod n, u2 = r / s mod n
540817466cbSJens Wiklander */
5413d3b0591SJens Wiklander ECDSA_BUDGET(MBEDTLS_ECP_OPS_CHK + MBEDTLS_ECP_OPS_INV + 2);
5423d3b0591SJens Wiklander
543817466cbSJens Wiklander MBEDTLS_MPI_CHK(mbedtls_mpi_inv_mod(&s_inv, s, &grp->N));
544817466cbSJens Wiklander
5453d3b0591SJens Wiklander MBEDTLS_MPI_CHK(mbedtls_mpi_mul_mpi(pu1, &e, &s_inv));
5463d3b0591SJens Wiklander MBEDTLS_MPI_CHK(mbedtls_mpi_mod_mpi(pu1, pu1, &grp->N));
547817466cbSJens Wiklander
5483d3b0591SJens Wiklander MBEDTLS_MPI_CHK(mbedtls_mpi_mul_mpi(pu2, r, &s_inv));
5493d3b0591SJens Wiklander MBEDTLS_MPI_CHK(mbedtls_mpi_mod_mpi(pu2, pu2, &grp->N));
550817466cbSJens Wiklander
5513d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE)
55232b31808SJens Wiklander if (rs_ctx != NULL && rs_ctx->ver != NULL) {
5533d3b0591SJens Wiklander rs_ctx->ver->state = ecdsa_ver_muladd;
55432b31808SJens Wiklander }
5553d3b0591SJens Wiklander
5563d3b0591SJens Wiklander muladd:
5573d3b0591SJens Wiklander #endif
558817466cbSJens Wiklander /*
559817466cbSJens Wiklander * Step 5: R = u1 G + u2 Q
560817466cbSJens Wiklander */
5613d3b0591SJens Wiklander MBEDTLS_MPI_CHK(mbedtls_ecp_muladd_restartable(grp,
5623d3b0591SJens Wiklander &R, pu1, &grp->G, pu2, Q, ECDSA_RS_ECP));
563817466cbSJens Wiklander
56432b31808SJens Wiklander if (mbedtls_ecp_is_zero(&R)) {
565817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_VERIFY_FAILED;
566817466cbSJens Wiklander goto cleanup;
567817466cbSJens Wiklander }
568817466cbSJens Wiklander
569817466cbSJens Wiklander /*
570817466cbSJens Wiklander * Step 6: convert xR to an integer (no-op)
571817466cbSJens Wiklander * Step 7: reduce xR mod n (gives v)
572817466cbSJens Wiklander */
573817466cbSJens Wiklander MBEDTLS_MPI_CHK(mbedtls_mpi_mod_mpi(&R.X, &R.X, &grp->N));
574817466cbSJens Wiklander
575817466cbSJens Wiklander /*
576817466cbSJens Wiklander * Step 8: check if v (that is, R.X) is equal to r
577817466cbSJens Wiklander */
57832b31808SJens Wiklander if (mbedtls_mpi_cmp_mpi(&R.X, r) != 0) {
579817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_VERIFY_FAILED;
580817466cbSJens Wiklander goto cleanup;
581817466cbSJens Wiklander }
582817466cbSJens Wiklander
583817466cbSJens Wiklander cleanup:
584817466cbSJens Wiklander mbedtls_ecp_point_free(&R);
5853d3b0591SJens Wiklander mbedtls_mpi_free(&e); mbedtls_mpi_free(&s_inv);
5863d3b0591SJens Wiklander mbedtls_mpi_free(&u1); mbedtls_mpi_free(&u2);
5873d3b0591SJens Wiklander
5883d3b0591SJens Wiklander ECDSA_RS_LEAVE(ver);
589817466cbSJens Wiklander
59032b31808SJens Wiklander return ret;
591817466cbSJens Wiklander }
592817466cbSJens Wiklander
593817466cbSJens Wiklander /*
5943d3b0591SJens Wiklander * Verify ECDSA signature of hashed message
5953d3b0591SJens Wiklander */
mbedtls_ecdsa_verify(mbedtls_ecp_group * grp,const unsigned char * buf,size_t blen,const mbedtls_ecp_point * Q,const mbedtls_mpi * r,const mbedtls_mpi * s)5963d3b0591SJens Wiklander int mbedtls_ecdsa_verify(mbedtls_ecp_group *grp,
5973d3b0591SJens Wiklander const unsigned char *buf, size_t blen,
5983d3b0591SJens Wiklander const mbedtls_ecp_point *Q,
5993d3b0591SJens Wiklander const mbedtls_mpi *r,
6003d3b0591SJens Wiklander const mbedtls_mpi *s)
6013d3b0591SJens Wiklander {
60232b31808SJens Wiklander return mbedtls_ecdsa_verify_restartable(grp, buf, blen, Q, r, s, NULL);
6033d3b0591SJens Wiklander }
6043d3b0591SJens Wiklander #endif /* !MBEDTLS_ECDSA_VERIFY_ALT */
6053d3b0591SJens Wiklander
6063d3b0591SJens Wiklander /*
607817466cbSJens Wiklander * Convert a signature (given by context) to ASN.1
608817466cbSJens Wiklander */
ecdsa_signature_to_asn1(const mbedtls_mpi * r,const mbedtls_mpi * s,unsigned char * sig,size_t sig_size,size_t * slen)609817466cbSJens Wiklander static int ecdsa_signature_to_asn1(const mbedtls_mpi *r, const mbedtls_mpi *s,
61032b31808SJens Wiklander unsigned char *sig, size_t sig_size,
61132b31808SJens Wiklander size_t *slen)
612817466cbSJens Wiklander {
61311fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
6147901324dSJerome Forissier unsigned char buf[MBEDTLS_ECDSA_MAX_LEN] = { 0 };
615817466cbSJens Wiklander unsigned char *p = buf + sizeof(buf);
616817466cbSJens Wiklander size_t len = 0;
617817466cbSJens Wiklander
618817466cbSJens Wiklander MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_mpi(&p, buf, s));
619817466cbSJens Wiklander MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_mpi(&p, buf, r));
620817466cbSJens Wiklander
621817466cbSJens Wiklander MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_len(&p, buf, len));
622817466cbSJens Wiklander MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_tag(&p, buf,
62332b31808SJens Wiklander MBEDTLS_ASN1_CONSTRUCTED |
62432b31808SJens Wiklander MBEDTLS_ASN1_SEQUENCE));
62532b31808SJens Wiklander
62632b31808SJens Wiklander if (len > sig_size) {
62732b31808SJens Wiklander return MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL;
62832b31808SJens Wiklander }
629817466cbSJens Wiklander
630817466cbSJens Wiklander memcpy(sig, p, len);
631817466cbSJens Wiklander *slen = len;
632817466cbSJens Wiklander
63332b31808SJens Wiklander return 0;
634817466cbSJens Wiklander }
635817466cbSJens Wiklander
636817466cbSJens Wiklander /*
637817466cbSJens Wiklander * Compute and write signature
638817466cbSJens Wiklander */
mbedtls_ecdsa_write_signature_restartable(mbedtls_ecdsa_context * ctx,mbedtls_md_type_t md_alg,const unsigned char * hash,size_t hlen,unsigned char * sig,size_t sig_size,size_t * slen,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng,mbedtls_ecdsa_restart_ctx * rs_ctx)6393d3b0591SJens Wiklander int mbedtls_ecdsa_write_signature_restartable(mbedtls_ecdsa_context *ctx,
6403d3b0591SJens Wiklander mbedtls_md_type_t md_alg,
641817466cbSJens Wiklander const unsigned char *hash, size_t hlen,
64232b31808SJens Wiklander unsigned char *sig, size_t sig_size, size_t *slen,
643817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t),
6443d3b0591SJens Wiklander void *p_rng,
6453d3b0591SJens Wiklander mbedtls_ecdsa_restart_ctx *rs_ctx)
646817466cbSJens Wiklander {
64711fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
648817466cbSJens Wiklander mbedtls_mpi r, s;
64932b31808SJens Wiklander if (f_rng == NULL) {
65032b31808SJens Wiklander return MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
65132b31808SJens Wiklander }
652817466cbSJens Wiklander
653817466cbSJens Wiklander mbedtls_mpi_init(&r);
654817466cbSJens Wiklander mbedtls_mpi_init(&s);
655817466cbSJens Wiklander
656817466cbSJens Wiklander #if defined(MBEDTLS_ECDSA_DETERMINISTIC)
65732b31808SJens Wiklander MBEDTLS_MPI_CHK(mbedtls_ecdsa_sign_det_restartable(&ctx->grp, &r, &s, &ctx->d,
6585b25c76aSJerome Forissier hash, hlen, md_alg, f_rng,
6595b25c76aSJerome Forissier p_rng, rs_ctx));
660817466cbSJens Wiklander #else
661817466cbSJens Wiklander (void) md_alg;
662817466cbSJens Wiklander
6633d3b0591SJens Wiklander #if defined(MBEDTLS_ECDSA_SIGN_ALT)
6647901324dSJerome Forissier (void) rs_ctx;
6657901324dSJerome Forissier
666817466cbSJens Wiklander MBEDTLS_MPI_CHK(mbedtls_ecdsa_sign(&ctx->grp, &r, &s, &ctx->d,
667817466cbSJens Wiklander hash, hlen, f_rng, p_rng));
6683d3b0591SJens Wiklander #else
6695b25c76aSJerome Forissier /* Use the same RNG for both blinding and ephemeral key generation */
67032b31808SJens Wiklander MBEDTLS_MPI_CHK(mbedtls_ecdsa_sign_restartable(&ctx->grp, &r, &s, &ctx->d,
6715b25c76aSJerome Forissier hash, hlen, f_rng, p_rng, f_rng,
6725b25c76aSJerome Forissier p_rng, rs_ctx));
6733d3b0591SJens Wiklander #endif /* MBEDTLS_ECDSA_SIGN_ALT */
6743d3b0591SJens Wiklander #endif /* MBEDTLS_ECDSA_DETERMINISTIC */
675817466cbSJens Wiklander
67632b31808SJens Wiklander MBEDTLS_MPI_CHK(ecdsa_signature_to_asn1(&r, &s, sig, sig_size, slen));
677817466cbSJens Wiklander
678817466cbSJens Wiklander cleanup:
679817466cbSJens Wiklander mbedtls_mpi_free(&r);
680817466cbSJens Wiklander mbedtls_mpi_free(&s);
681817466cbSJens Wiklander
68232b31808SJens Wiklander return ret;
683817466cbSJens Wiklander }
684817466cbSJens Wiklander
6853d3b0591SJens Wiklander /*
6863d3b0591SJens Wiklander * Compute and write signature
6873d3b0591SJens Wiklander */
mbedtls_ecdsa_write_signature(mbedtls_ecdsa_context * ctx,mbedtls_md_type_t md_alg,const unsigned char * hash,size_t hlen,unsigned char * sig,size_t sig_size,size_t * slen,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)6883d3b0591SJens Wiklander int mbedtls_ecdsa_write_signature(mbedtls_ecdsa_context *ctx,
6893d3b0591SJens Wiklander mbedtls_md_type_t md_alg,
6903d3b0591SJens Wiklander const unsigned char *hash, size_t hlen,
69132b31808SJens Wiklander unsigned char *sig, size_t sig_size, size_t *slen,
6923d3b0591SJens Wiklander int (*f_rng)(void *, unsigned char *, size_t),
6933d3b0591SJens Wiklander void *p_rng)
6943d3b0591SJens Wiklander {
69532b31808SJens Wiklander return mbedtls_ecdsa_write_signature_restartable(
69632b31808SJens Wiklander ctx, md_alg, hash, hlen, sig, sig_size, slen,
69732b31808SJens Wiklander f_rng, p_rng, NULL);
6983d3b0591SJens Wiklander }
6993d3b0591SJens Wiklander
700817466cbSJens Wiklander /*
701817466cbSJens Wiklander * Read and check signature
702817466cbSJens Wiklander */
mbedtls_ecdsa_read_signature(mbedtls_ecdsa_context * ctx,const unsigned char * hash,size_t hlen,const unsigned char * sig,size_t slen)703817466cbSJens Wiklander int mbedtls_ecdsa_read_signature(mbedtls_ecdsa_context *ctx,
704817466cbSJens Wiklander const unsigned char *hash, size_t hlen,
705817466cbSJens Wiklander const unsigned char *sig, size_t slen)
706817466cbSJens Wiklander {
70732b31808SJens Wiklander return mbedtls_ecdsa_read_signature_restartable(
70832b31808SJens Wiklander ctx, hash, hlen, sig, slen, NULL);
7093d3b0591SJens Wiklander }
7103d3b0591SJens Wiklander
7113d3b0591SJens Wiklander /*
7123d3b0591SJens Wiklander * Restartable read and check signature
7133d3b0591SJens Wiklander */
mbedtls_ecdsa_read_signature_restartable(mbedtls_ecdsa_context * ctx,const unsigned char * hash,size_t hlen,const unsigned char * sig,size_t slen,mbedtls_ecdsa_restart_ctx * rs_ctx)7143d3b0591SJens Wiklander int mbedtls_ecdsa_read_signature_restartable(mbedtls_ecdsa_context *ctx,
7153d3b0591SJens Wiklander const unsigned char *hash, size_t hlen,
7163d3b0591SJens Wiklander const unsigned char *sig, size_t slen,
7173d3b0591SJens Wiklander mbedtls_ecdsa_restart_ctx *rs_ctx)
7183d3b0591SJens Wiklander {
71911fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
720817466cbSJens Wiklander unsigned char *p = (unsigned char *) sig;
721817466cbSJens Wiklander const unsigned char *end = sig + slen;
722817466cbSJens Wiklander size_t len;
723817466cbSJens Wiklander mbedtls_mpi r, s;
724817466cbSJens Wiklander mbedtls_mpi_init(&r);
725817466cbSJens Wiklander mbedtls_mpi_init(&s);
726817466cbSJens Wiklander
727817466cbSJens Wiklander if ((ret = mbedtls_asn1_get_tag(&p, end, &len,
72832b31808SJens Wiklander MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
729817466cbSJens Wiklander ret += MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
730817466cbSJens Wiklander goto cleanup;
731817466cbSJens Wiklander }
732817466cbSJens Wiklander
73332b31808SJens Wiklander if (p + len != end) {
7347901324dSJerome Forissier ret = MBEDTLS_ERROR_ADD(MBEDTLS_ERR_ECP_BAD_INPUT_DATA,
7357901324dSJerome Forissier MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
736817466cbSJens Wiklander goto cleanup;
737817466cbSJens Wiklander }
738817466cbSJens Wiklander
739817466cbSJens Wiklander if ((ret = mbedtls_asn1_get_mpi(&p, end, &r)) != 0 ||
74032b31808SJens Wiklander (ret = mbedtls_asn1_get_mpi(&p, end, &s)) != 0) {
741817466cbSJens Wiklander ret += MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
742817466cbSJens Wiklander goto cleanup;
743817466cbSJens Wiklander }
7443d3b0591SJens Wiklander #if defined(MBEDTLS_ECDSA_VERIFY_ALT)
7457901324dSJerome Forissier (void) rs_ctx;
7467901324dSJerome Forissier
747817466cbSJens Wiklander if ((ret = mbedtls_ecdsa_verify(&ctx->grp, hash, hlen,
74832b31808SJens Wiklander &ctx->Q, &r, &s)) != 0) {
749817466cbSJens Wiklander goto cleanup;
75032b31808SJens Wiklander }
7513d3b0591SJens Wiklander #else
75232b31808SJens Wiklander if ((ret = mbedtls_ecdsa_verify_restartable(&ctx->grp, hash, hlen,
75332b31808SJens Wiklander &ctx->Q, &r, &s, rs_ctx)) != 0) {
7543d3b0591SJens Wiklander goto cleanup;
75532b31808SJens Wiklander }
7563d3b0591SJens Wiklander #endif /* MBEDTLS_ECDSA_VERIFY_ALT */
757817466cbSJens Wiklander
7583d3b0591SJens Wiklander /* At this point we know that the buffer starts with a valid signature.
7593d3b0591SJens Wiklander * Return 0 if the buffer just contains the signature, and a specific
7603d3b0591SJens Wiklander * error code if the valid signature is followed by more data. */
76132b31808SJens Wiklander if (p != end) {
762817466cbSJens Wiklander ret = MBEDTLS_ERR_ECP_SIG_LEN_MISMATCH;
76332b31808SJens Wiklander }
764817466cbSJens Wiklander
765817466cbSJens Wiklander cleanup:
766817466cbSJens Wiklander mbedtls_mpi_free(&r);
767817466cbSJens Wiklander mbedtls_mpi_free(&s);
768817466cbSJens Wiklander
76932b31808SJens Wiklander return ret;
770817466cbSJens Wiklander }
771817466cbSJens Wiklander
7723d3b0591SJens Wiklander #if !defined(MBEDTLS_ECDSA_GENKEY_ALT)
773817466cbSJens Wiklander /*
774817466cbSJens Wiklander * Generate key pair
775817466cbSJens Wiklander */
mbedtls_ecdsa_genkey(mbedtls_ecdsa_context * ctx,mbedtls_ecp_group_id gid,int (* f_rng)(void *,unsigned char *,size_t),void * p_rng)776817466cbSJens Wiklander int mbedtls_ecdsa_genkey(mbedtls_ecdsa_context *ctx, mbedtls_ecp_group_id gid,
777817466cbSJens Wiklander int (*f_rng)(void *, unsigned char *, size_t), void *p_rng)
778817466cbSJens Wiklander {
7795b25c76aSJerome Forissier int ret = 0;
7805b25c76aSJerome Forissier ret = mbedtls_ecp_group_load(&ctx->grp, gid);
78132b31808SJens Wiklander if (ret != 0) {
78232b31808SJens Wiklander return ret;
78332b31808SJens Wiklander }
7845b25c76aSJerome Forissier
78532b31808SJens Wiklander return mbedtls_ecp_gen_keypair(&ctx->grp, &ctx->d,
78632b31808SJens Wiklander &ctx->Q, f_rng, p_rng);
787817466cbSJens Wiklander }
7883d3b0591SJens Wiklander #endif /* !MBEDTLS_ECDSA_GENKEY_ALT */
789817466cbSJens Wiklander
790817466cbSJens Wiklander /*
791817466cbSJens Wiklander * Set context from an mbedtls_ecp_keypair
792817466cbSJens Wiklander */
mbedtls_ecdsa_from_keypair(mbedtls_ecdsa_context * ctx,const mbedtls_ecp_keypair * key)793817466cbSJens Wiklander int mbedtls_ecdsa_from_keypair(mbedtls_ecdsa_context *ctx, const mbedtls_ecp_keypair *key)
794817466cbSJens Wiklander {
79511fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
796817466cbSJens Wiklander if ((ret = mbedtls_ecp_group_copy(&ctx->grp, &key->grp)) != 0 ||
797817466cbSJens Wiklander (ret = mbedtls_mpi_copy(&ctx->d, &key->d)) != 0 ||
79832b31808SJens Wiklander (ret = mbedtls_ecp_copy(&ctx->Q, &key->Q)) != 0) {
799817466cbSJens Wiklander mbedtls_ecdsa_free(ctx);
800817466cbSJens Wiklander }
801817466cbSJens Wiklander
80232b31808SJens Wiklander return ret;
803817466cbSJens Wiklander }
804817466cbSJens Wiklander
805817466cbSJens Wiklander /*
806817466cbSJens Wiklander * Initialize context
807817466cbSJens Wiklander */
mbedtls_ecdsa_init(mbedtls_ecdsa_context * ctx)808817466cbSJens Wiklander void mbedtls_ecdsa_init(mbedtls_ecdsa_context *ctx)
809817466cbSJens Wiklander {
810817466cbSJens Wiklander mbedtls_ecp_keypair_init(ctx);
811817466cbSJens Wiklander }
812817466cbSJens Wiklander
813817466cbSJens Wiklander /*
814817466cbSJens Wiklander * Free context
815817466cbSJens Wiklander */
mbedtls_ecdsa_free(mbedtls_ecdsa_context * ctx)816817466cbSJens Wiklander void mbedtls_ecdsa_free(mbedtls_ecdsa_context *ctx)
817817466cbSJens Wiklander {
81832b31808SJens Wiklander if (ctx == NULL) {
8193d3b0591SJens Wiklander return;
82032b31808SJens Wiklander }
8213d3b0591SJens Wiklander
822817466cbSJens Wiklander mbedtls_ecp_keypair_free(ctx);
823817466cbSJens Wiklander }
824817466cbSJens Wiklander
8253d3b0591SJens Wiklander #if defined(MBEDTLS_ECP_RESTARTABLE)
8263d3b0591SJens Wiklander /*
8273d3b0591SJens Wiklander * Initialize a restart context
8283d3b0591SJens Wiklander */
mbedtls_ecdsa_restart_init(mbedtls_ecdsa_restart_ctx * ctx)8293d3b0591SJens Wiklander void mbedtls_ecdsa_restart_init(mbedtls_ecdsa_restart_ctx *ctx)
8303d3b0591SJens Wiklander {
8313d3b0591SJens Wiklander mbedtls_ecp_restart_init(&ctx->ecp);
8323d3b0591SJens Wiklander
8333d3b0591SJens Wiklander ctx->ver = NULL;
8343d3b0591SJens Wiklander ctx->sig = NULL;
8353d3b0591SJens Wiklander #if defined(MBEDTLS_ECDSA_DETERMINISTIC)
8363d3b0591SJens Wiklander ctx->det = NULL;
8373d3b0591SJens Wiklander #endif
8383d3b0591SJens Wiklander }
8393d3b0591SJens Wiklander
8403d3b0591SJens Wiklander /*
8413d3b0591SJens Wiklander * Free the components of a restart context
8423d3b0591SJens Wiklander */
mbedtls_ecdsa_restart_free(mbedtls_ecdsa_restart_ctx * ctx)8433d3b0591SJens Wiklander void mbedtls_ecdsa_restart_free(mbedtls_ecdsa_restart_ctx *ctx)
8443d3b0591SJens Wiklander {
84532b31808SJens Wiklander if (ctx == NULL) {
8463d3b0591SJens Wiklander return;
84732b31808SJens Wiklander }
8483d3b0591SJens Wiklander
8493d3b0591SJens Wiklander mbedtls_ecp_restart_free(&ctx->ecp);
8503d3b0591SJens Wiklander
8513d3b0591SJens Wiklander ecdsa_restart_ver_free(ctx->ver);
8523d3b0591SJens Wiklander mbedtls_free(ctx->ver);
8533d3b0591SJens Wiklander ctx->ver = NULL;
8543d3b0591SJens Wiklander
8553d3b0591SJens Wiklander ecdsa_restart_sig_free(ctx->sig);
8563d3b0591SJens Wiklander mbedtls_free(ctx->sig);
8573d3b0591SJens Wiklander ctx->sig = NULL;
8583d3b0591SJens Wiklander
8593d3b0591SJens Wiklander #if defined(MBEDTLS_ECDSA_DETERMINISTIC)
8603d3b0591SJens Wiklander ecdsa_restart_det_free(ctx->det);
8613d3b0591SJens Wiklander mbedtls_free(ctx->det);
8623d3b0591SJens Wiklander ctx->det = NULL;
8633d3b0591SJens Wiklander #endif
8643d3b0591SJens Wiklander }
8653d3b0591SJens Wiklander #endif /* MBEDTLS_ECP_RESTARTABLE */
8663d3b0591SJens Wiklander
867817466cbSJens Wiklander #endif /* MBEDTLS_ECDSA_C */
868